I think it is no security reason, but in UNIX i think in the File /etc/password and /etc/shadow the colon may be used as a seperator. Perhaps you are missunderstanding something.
hnd
hasso55@yahoo.com
The really only thing is to Monitor ALL activities of your staff. Even blocking Internet ports does not prevent a user from downloading a Tool which could Transfer Data to Port 80 of an arbitrary server, Which has been prepared for this purpose.
But be careful that you do not violate the...
What I am doing is running Trojancheck. It does not scan. but it reports Activities like Modifying registry, *.ini files and modifying the Autostart.
I think it is pretty reliable.
But a Virusscan is most important, because most Trojans are detected by that way. But Never forget to keep the...
A friend of mine living about 800 km away from me has since today a severe problem.
His XP Workstation hangs during booting. You see some activity on the Hard disk and no more.
A Virus ist pretty unlikely, because he is running his Virusscanner permanent and he keeps his definitions up to date...
Only one thing: In IP-Adressing following Adresses are not allowed:
1. All bits are set to 1, because this would be the Broadcast address of the Subnet.
2. All host bits set 0, because this Adress is equal to the Netmask.
This disallows host-part 0 and 8191. Therefore you have 8190 addresses...
If you are interested in TCP/IP from the programmers view then read the book from Stevens "Unix Network Programming"
If gives you a lot of features in Networking with TCP/IP.
hnd
hasso55@yahoo.com
Install the ODBC (or Native) Driver Connect the program to the Database, Use the class TTable and that is it.
But one thing: If you are working in a networked environment, don't use Access. It is very slow under that conditions.
hnd
hasso55@yahoo.com
I have read abbout algorithms to create Large Prime numbers.
It was described in Garfinkels Book on PGP. I don't have it available in the Moment but i will have a look in that.
hnd
hasso55@yahoo.com
If your Firewall works similar a Proxy Server (Is there an other Way?) then this firewall on the Internet Entry Point should be enough.
But if your Server is connected to the Internet via the same Adapter like the local Network then you could get Problems.
hnd
hasso55@yahoo.com
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.